Follow
Nazila Gol Mohammadi
Nazila Gol Mohammadi
paluno - The Ruhr Institute for Software Technology
Verified email at paluno.uni-due.de
Title
Cited by
Cited by
Year
A Tool for Monitoring and Maintaining System Trustworthiness at Runtime
A Goldsteen, M Moffie, T Bandyszak, NG Mohammadi, X Chen, ...
Proceedings of the 1st International Workshop on Requirements Engineeringá…, 2015
1132015
Trustworthiness attributes and metrics for engineering trusted internet-based software systems
NG Mohammadi, S Paulus, M Bishr, A Metzger, H K÷nnecke, ...
International Conference on Cloud Computing and Services Science, 19-35, 2013
722013
An Analysis of Software Quality Attributes and Their Contribution to Trustworthiness.
NG Mohammadi, S Paulus, M Bishr, A Metzger, H Koennecke, ...
CLOSER, 542-552, 2013
422013
Trustworthy software development
S Paulus, NG Mohammadi, T Weyer
IFIP International Conference on Communications and Multimedia Security, 233-247, 2013
292013
Nazila Gol Mohammadi, and Thorsten Weyer. Trustworthy software development
S Paulus
Proceedings of The IFIP International Conference on Communications andá…, 0
29*
A framework for combining problem frames and goal models to support context analysis during requirements engineering
NG Mohammadi, A Alebrahim, T Weyer, M Heisel, K Pohl
International Conference on Availability, Reliability, and Security, 272-288, 2013
242013
Trustworthy Cyber-Physical Systems
G Mohammadi
Springer Fachmedien Wiesbaden, 2019
192019
Privacy Policy Specification Framework for Addressing End-Users’ Privacy Requirements
NG Mohammadi, J Leicht, N Ulfat-Bunyadi, M Heisel
International Conference on Trust and Privacy in Digital Business, 46-62, 2019
182019
A Framework for Systematic Analysis and Modeling of Trustworthiness Requirements Using i* and BPMN
NG Mohammadi, M Heisel
International Conference on Trust and Privacy in Digital Business, 3-18, 2016
162016
Maintaining trustworthiness of socio-technical systems at run-time
NG Mohammadi, T Bandyszak, M Moffie, X Chen, T Weyer, C Kalogiros, ...
International Conference on Trust, Privacy and Security in Digital Businessá…, 2014
162014
Patterns for identification of trust concerns and specification of trustworthiness requirements
NG Mohammadi, M Heisel
Proceedings of the 21st European Conference on Pattern Languages of Programsá…, 2016
152016
Enhancing Business Process Models with Trustworthiness Requirements
NG Mohammadi, M Heisel
IFIP International Conference on Trust Management, 33-51, 2016
142016
A Framework for Systematic Refinement of Trustworthiness Requirements
NG Mohammadi, M Heisel
Information 8 (2), 46, 2017
122017
Extending Software Development Methodologies to Support Trustworthiness-by-Design.
NG Mohammadi, T Bandyszak, S Paulus, PH Meland, T Weyer, K Pohl
CAiSE Forum, 213-220, 2015
112015
Towards trustworthiness assurance in the cloud
F Di Cerbo, P Bisson, A Hartman, S Keller, PH Meland, M Moffie, ...
Cyber Security and Privacy Forum, 3-15, 2013
112013
Towards an End-to-End Architecture for Run-Time Data Protection in the Cloud
NG Mohammadi, Z┴ Mann, A Metzger, M Heisel, J Greig
2018 44th Euromicro Conference on Software Engineering and Advancedá…, 2018
102018
Combining Risk-Management and Computational Approaches for Trustworthiness Evaluation of Socio-Technical Systems.
NG Mohammadi, T Bandyszak, A Goldsteen, C Kalogiros, T Weyer, ...
CAiSE Forum, 237-244, 2015
102015
Pattern-based incorporation of privacy preferences into privacy policies: negotiating the conflicting needs of service providers and end-users
NG Mohammadi, J Pampus, M Heisel
Proceedings of the 24th European Conference on Pattern Languages of Programsá…, 2019
82019
A framework for evaluating the end-to-end trustworthiness
NG Mohammadi, T Bandyszak, C Kalogiros, M Kanakakis, T Weyer
2015 IEEE Trustcom/BigDataSE/ISPA 1, 638-645, 2015
72015
Extending development methodologies with trustworthiness-by-design for socio-technical systems
NG Mohammadi, T Bandyszak, S Paulus, PH Meland, T Weyer, K Pohl
Trust, 206-207, 2014
72014
The system can't perform the operation now. Try again later.
Articles 1–20